^ Top

NANOG 64 Agenda

All times will be listed in Pacific Time.

**Agenda is subject to change.**

Floor Plans

The NANOG 64 Agenda icalendar feed is now available! 
Download the .ics file and import into your calendar, or subscribe to the URL: 
http://www.nanog.org/sites/default/files/ical/nanog.ics

Download the Guidebook app!

If you already have the app, you can search for NANOG 64 and download the guide to your mobile device!

Sunday, May 31 2015
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
4:00pm - 6:00pmMezzanine Registration AreaRegistration
6:00pm - 10:00pmOffsiteSocial
Additional information
Sponsors:
Monday, June 1 2015
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
8:30am - 11:00amItalian RoomContinental Items
8:30am - 11:00am32nd FloorExtended BreakfastSponsors:
8:30am - 5:00pmMezzanine Registration AreaRegistration
10:00am - 10:30am

Grand Ballroom

Conference Opening

NANOG Board of Directors: Dan Golding -- Chair Local Host Sponsor: Aaron Klink -- Netflix Connectivity Sponsors: Mike Vogel -- Comcast Jack Waters -- Level3 NANOG Program Committee: Tony Tauber, Chair

View full abstract page.
Speakers:

  • Daniel Golding, Google
  • Daniel Golding is responsible for Google's data center edge strategy, including colocation facilities, cable landing stations, edge caches, and network points-of-presence. Prior to joining Google, he held executive roles at Iron Mountain, NTT RagingWire, and 451 Research. Daniel is Chairman of the Board of NANOG, the North American Network Operators Group, and was a founder of Open-IX. Daniel earned a Bachelor of Mechanical Engineering degree from Auburn University as well as a Master of Science degree in telecommunications engineering from George Mason University.

  • Aaron Klink, Netflix
  • Aaron Klink is the Manager of Network Strategy and ISP Partner Engagement for the Americas and EMEA at Netflix. His team handles peering and interconnection, appliance deployments, and strategic discussions that enable ISPs to localize and control the Netflix content traffic their users request, while maximizing the quality of experience. Aaron has been involved with the NANOG community since 1997 and is a contributor to interconnection events such as AIS and GPF.

  • Tony Tauber, Comcast
  • In his role as Distinguished Engineer at Comcast, Tony focuses on Backbone and Core network architecture and engineering with particular attention to measurement, manageability, and automation. He also partners with the research and education communities on projects and currently chairs the NANOG Program Committee. In the past Tony held senior network engineering positions at BBN, GTE Internetworking, Genuity, Level3, and MIT Lincoln Lab as well as served as co-chair of the Routing Protocol Security working group in the IETF.
youtubeConference Opening
pdfConference Opening (slides)(PDF)
10:30am - 11:00am

Grand Ballroom

Open Internet Order – a regulator’s read of the FCC’s recent Open Internet Order, and related regulatory proceedings.

Chris Witteman is a senior litigation attorney for the California Public Utilities Commission. His talk will focus on the FCC's February 26, 2015 Open Internet Order, and provide a digestible overview of the Order's 400 pages, and what it might mean in practice for consumers, competitive carriers, and content and service providers. The talk will focus on the “No throttling,” “No paid prioritization,” and “No unreasonable interference” regulations adopted by the FCC, and how the FCC is likely (or not) to interpret and enforce those regulations. Attention will be paid to interconnection, transit, and peering issues that many believe are integral to ensuring an open Internet: how will the FCC monitor and approach those issues under the Order, and how might they do so in the future? The talk will also examine how the Order affects the ability of state regulators to resolve both consumer complaints and interconnection disputes. The talk will conclude with a few remarks on recent state initiatives related to broadband and telecommunications, and any questions the attendees may have. ** Mr. Witteman began his litigation career with a series of cable access cases in the late 1980s and 1990s. In 2001, he went to work for the California Public Utilities Commission, where – among many other telecommunications issues -- he has litigated interconnection cases through to the Ninth Circuit Court of Appeals. He appears as an individual, and not as a representative of the CPUC. Chris Witteman 415.806.4694 c [email protected]

View full abstract page.
Speakers:

  • Chris Witteman, California Public Utilities Commission
  • Chris Witteman is currently a Senior Staff Counsel for Telecommunications & Consumer Protection with the California Public Utilities Commission, but he has worked on electronic network issues for most of his 30 year legal career. (He appears here in his individual capacity). Since joining the CPUC in 2001, he has worked on merger cases, interconnection disputes, and anything involving “the wires.” In his spare time, he has written about the constitutional dimensions of communication and information freedom. He lives in San Francisco.
youtubeOpen Internet Order
pdfOpen Internet Order – a regulator’s read of the FCC’s recent Open Inte(PDF)
11:30am - 12:00pm

Grand Ballroom

Home Network or Access Link? Locating Last-mile Downstream Throughput Bottlenecks

As home networks see increasingly faster downstream throughput speeds, a natural question is whether users are benefiting from these faster speeds or simply facing performance bottlenecks in their own home networks. In this work, we study a simple question: Are users’ downstream throughput bottlenecks in their home networks or in their access ISPs? Although our question is simple, answering it on a large-scale deployment is challenging because accurate measurements require instrumentation of a home router, which is too resource-constrained for many existing throughput analysis tools. In this work, we identify lightweight metrics that can accurately identify whether a throughput bottleneck lies inside or outside a user’s home network and develop a detection algorithm that accurately locates these bottlenecks. We validate this algorithm in controlled settings and report on two deployments, one of which is the FCC deployment with 2,652 homes in the United States. We find that wireless bottlenecks are more common than access-link bottlenecks—particularly for home networks with downstream throughput greater than 20 Mbps, where access-link bottlenecks are relatively rare. In homes with a wireless bottleneck, it is equally likely that only one device experiences the bottleneck as it is for all devices to experience the wireless bottleneck simultaneously.

View full abstract page.
Speakers:

  • Srikanth Sundaresan, International Computer Science Institute, Berkeley
  • Srikanth is a postdoctoral fellow at ICSI, Berkeley. His research interests are in the design and performance of Networked Systems. Currently his research focuses on performance issues in broadband networks — both fixed line and mobile. His work has won the IRTF Applied Networking Research Prize, and the IMC Community Contribution Award, the Georgia Tech CS Dissertation Award, and has been published as a Research Highlight by the Communications of the ACM.
youtubeHome Network or Access Link?
pdfHome Network or Access Link? Locating Last-mile Downstream Throughput (PDF)
12:00pm - 1:00pmCalifornia East/WestNewcomers Lunch - By Invitation OnlySponsors:
12:00pm - 1:00pm32nd FloorWelcome LunchSponsors:
1:00pm - 1:30pm

Grand Ballroom

SENSS: Security Service for the Internet

Distributed network attacks, such as DDoS and BGP prefix hijacking can severely hurt online businesses and disrupt critical infrastructure services. The main challenge in handling such attacks is their distributed nature: the best locations to diagnose and mitigate them are often far from the victim's network. Today's Internet has no automated mechanism for victims to ask help of remote ISPs, and has low incentives for remote ISPs to offer such services. Consequently, prefix hijacking attacks go largely unmitigated, and victims of DDoS attacks pay exorbitant prices to large CDNs to distribute their contents and thus sustain the attacks. We propose SENSS, a programmable security service for the Internet. SENSS brings simple and generic programmable interfaces from SDN to inter-AS security. These interfaces can be easily implemented in today's ISPs; victims use them to observe and control their own traffic and routes in remote ISPs, and pay per use. We show how victims can leverage these simple interfaces to design solutions against many attacks. We provide six such custom programs that handle a variety of DDoS and BGP prefix hijacking attacks, many of which are not handled today. We evaluate SENSS through extensive simulations and prototype implementation, using realistic traffic and Internet topology, and show that it is very effective in sparse deployment (with adoption in 20 large ISPs, SENSS can eliminate 80-96\% DDoS attack traffic and correct 92--99\% of polluted ASes for BGP prefix hijacking), and it has low message overhead and delay.

View full abstract page.
Speakers:
  • Abdulla Alwabel.
  • Jelena Mirkovic, USC/ISI
  • Jelena Mirkovic is Project Leader at USC/ISI and research faculty at USC. She received her MS and PhD from UCLA. She received BS in Computer Science and Engineering from School of Electrical Engineering, University of Belgrade, Serbia. Jelena's research interests span networking and security fields. Her current research is focused on malware analysis, denial-of-service attacks, and IP spoofing. Additionally, she is interested in methodologies for conducting security experiments and Internet measurement.
  • Minlan Yu.
  • Ying Zhang.
youtubeSENSS: Security Service for the Internet
pdfSENSS: Security Service for the Internet (slides)(PDF)
1:30pm - 2:00pm

Grand Ballroom

Monitoring, managing and troubleshooting large scale networks.

Monitoring, managing and troubleshooting large scale networks. Almost four years ago I came to NANOG and mostly complained about the state of monitoring networks, par for the course for me. A lot has changed since then, we've solved many of the problems I addressed. Perhaps more importantly, we've fundamentally changed how we manage, monitor and troubleshoot our network. We plan to share what we learned, what went well, and best of all, what went oh so terribly wrong. Our driving philosophy behind this effort is that by taking an engineering approach to operations, you can greatly reduce the time to discover, mitigate and resolve issues on your network. We analyzed our faults, our pain points and the work that consumed most of our time. This allowed us to prioritize what we tackled first, we were surprised by what we learned caused the most outages, and how much impact minor network issues can have when they fall in the right place. From this, today, the majority of the faults that occur in our network are automatically detected, and mitigated all without human intervention. We'll dive into some of the most interesting issues we've experienced in our network, how we narrowed them down before, and after our new tooling and monitoring was deployed. We'll walk through specific examples of remediations and how the systems function. I'm lazy, I don't want to spend my time fixing known issues, I want to work on new problems, I want a challenge. This was the driving force behind our approach, if this sounds like you, them this talk is for you. ---- One of the keys to this effort was a system called FBAR, which interacts with our devices to perform the tasks needed to resolve issues. We'll explain in detail how this works, as well some of our earlier remediations. As a companion to this talk, David Swafford will be preparing a separate tutorial session to show you how to build your own system much like FBAR to help detect, isolate and remedy issues automatically.

View full abstract page.
Speakers:

  • Peter Hoose, Facebook, Inc.
  • Peter has spent the last fifteen years attempting to automate himself out of a job, thus far unsuccessfully. Rest assured, he’ll keep at it until the job is done. In his current role as Network Infrastructure Manager at Facebook, his teams combine the power of automation with solid network engineering to keep facebook’s global backbone, and datacenter networks running fast, reliably, and efficiently. Today, they are building the infrastructure to deploy wedge, six-pack and fboss, facebook’s open switching platform and network operating system. Prior to this, Peter worked as a Network Engineer at Facebook, and further in the past as Senior Network Engineer and Architect at NTT America where he built custom dedicated hosting solutions for customers large, and small.
youtubeMonitoring, managing and troubleshooting large scale networks.
pdfMonitoring, managing and troubleshooting large scale networks. (slides(PDF)
2:00pm - 2:30pm

Grand Ballroom

Netflix Open Connect: Starting from a Greenfield

Learn about how the Netflix Open Connect network evolved from the ground up.

View full abstract page.
Speakers:

  • David Temkin, Netflix
  • Dave Temkin is the Director of Global Networks for Netflix. Having been hired to build the Open Connect CDN, he is responsible for all network architecture and strategy as well as the operations fo the Netflix network (AS2906). Before Netflix, he was at Yahoo!, where he focused on Layer 4-7 network architecture, having been brought in through the successful acquisition of Right Media where he was the Global Head of Networks. In his spare time he enjoys travel and philanthropy - both through volunteering at technical organizations such as NANOG, where he is vice chair, Open-IX, where he is the chairman and co-founder and FL-IX, where he is also chairman and cofounder, as well as on the board of Children of Bellevue.
youtubeNetflix Open Connect: Starting from a Greenfield
pdfNetflix Open Connect: Starting from a Greenfield (slides)(PDF)
2:30pm - 3:00pmItalian RoomBreakSponsors:
3:00pm - 5:00pm

Tower Salon A

ARIN Public Policy Consultation Session

3:00 Opening - John Curran 3:10 Status of the IPv4 Free Pool - Leslie Nobile 3:20 AC Report - Dan Alexander 3:30 Number Resource Policy Discussions a. ARIN-2015-1: Modification to Criteria for IPv6 Initial End-User Assignments b. ARIN-prop-216 Modify 8.4 (Inter-RIR Transfers to Specified Recipients) c. ARIN-prop-217 Remove 30 day utilization requirement in end-user IPv4 policy d. ARIN-prop-218 Modify 8.2 section to better reflect how ARIN handles reorganizations 4:30 Future ARIN Public Policy Consultations (PPCs) 5:00 Closing

View full abstract page.
Additional information
Speakers:
  • Einar Bohlin, ARIN.
youtubeARIN Public Policy Consultation Session
3:00pm - 5:00pmColonial

Data Center Track

The track will last 2 hours and be broken into four sections, a 30 minute presentation, a 30 minute panel discussion, a second 30 minute presentation, and 30 minute update and open mike discussion on Open-IX. The first presentation - "Moving Away from the Grid - Implementing Fuel Cell Technology for Data Centers" will be by Peter Gross, Vice President of Mission Critical Systems at Bloom Energy. The panel presentation - "When is N enough, Reducing Reliability in the Data Center" will be anchored by Jim Smith, Chief Technology Officer & Senior Vice President of Portfolio Operations for Digital Realty Trust. Lucy Yong of Huawei will present "Inter-AS Options for Network Virtualization Overlay." Data Center (DC) Network Virtualization Overlay (NVO) supports many tenant virtual networks in a DC with privacy and security properties. Some tenant virtual networks in a DC are required to interwork with BGP/MPLS WAN VPNs to provide end-to-end connectivity to tenant sites. Inter-AS options specified in [RFC4364] can be used between a DC NVO and BGP/MPLS WAN VPN. This presentation describes the inter-AS solutions for DC NVO and WAN VPN interworking that are being worked in IETF now and the solutions comparison. Gabe Cole will lead the Open-IX update will review progress this year, the data center evaluation tools that have been developed, complaint resolution process, and additional standards currently under consideration.

View full abstract page.
Speakers:
  • Gabe Cole, RTE Group, Inc..
youtubeData Center Track
pdfData Center Track (slides)(PDF)
3:00pm - 5:00pmGrand Ballroom

Research and Education Track

Training Network Administrators in a Game-Like Environment - Murat Yuksel Water, not Land [A perspective on IPv4 runout] - Julie Percival Evaluating Network Buffer Size requirements for Very Large Data Transfers - Michael Smitasin Pacific Research Platform - John Hess and Camille Crittenden Science DMZ/High-performance network security [time-permitting] - Michael Sinatra

View full abstract page.
Speakers:

  • Julie Percival, University of Texas at Dallas
  • Dr. Julie Burlingame Percival is a recent graduate of the University of Texas at Dallas Public Policy and Political Economy program. Individuals with this degree employ advanced econometric analyses (logit, probit, time series, Bayesian, game theory) on a wide range of policy issues. Dr. Percival chose to concentrate in urban issues like education and public infrastructure. Her dissertation, Variation in High School Dropouts and their Outcomes, used factor analysis to extract common traits from male and female dropouts using national survey data and used logit, probit, and logistical regression to examine for differences in outcome by gender. She has written two papers on IT infrastructure topics (as yet unpublished); one a case study in the management of IP addresses by IANA and ICANN, and the other analyzing the influence of Mertonian scientific norms on IT Infrastructure culture. She has two children, two cats, and is married to Ray Percival (@scarynetworkguy / sng).

  • Michael Sinatra, ESnet
  • Michael Sinatra is a Senior Network, Systems, and Security Engineer with ESnet. Prior to that he worked for UC Berkeley for 19 years. He has been a member of NANOG's Program Committee since 2011.

  • Michael Smitasin, Lawrence Berkeley National Laboratory
  • Network Engineer for Lawrence Berkeley National Laboratory as part of the campus network group (LBLnet) since August 2013. Research interests include secure network architecture, applied cryptography, network-based building occupancy monitoring, infrastructure virtualization, and high-bandwidth, science-focused networking.

  • Murat Yuksel, University of Nevada, Reno
  • Murat Yuksel is an Associate Professor at the CSE Department of The University of Nevada, Reno (UNR), Reno, NV. He has been a software engineer at Pepperdata since 2014. Prior to UNR, he was with the ECSE Department of Rensselaer Polytechnic Institute (RPI), Troy, NY as a Postdoctoral Associate and an Adjunct Faculty until 2006. He received a B.S. in computer engineering of Ege University, Izmir, Turkey in 1996. He received M.S. and Ph.D. in computer science of RPI in 1999 and 2002 respectively. His research interests are in the area of networked, wireless, and computer systems with a recent focus on big-data networking, UAV networks, optical wireless, public safety communications, economics of cyber-security and cyber-sharing, routing economics, network management, and network architectures. He has been on the editorial board of Computer Networks and is a co-recipient of the IEEE LANMAN 2008 Best Paper Award. He is a senior member of IEEE, senior and life member of ACM, and was a member of Sigma Xi and ASEE.
youtubeResearch and Education Track
pdfResearch and Education Track (slides)(PDF)
5:00pm - 6:30pmCalifornia East & WestPeering PersonalsSponsors:
8:00pm - 12:00amOffsiteSocial
Additional information
Sponsors:
Tuesday, June 2 2015
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
8:30am - 9:30amVictorsMembers Breakfast - By Invitation Only
8:30am - 9:30am32nd FloorPower BreakfastSponsors:
8:30am - 5:00pmMezzanine Registration AreaRegistration
9:30am - 11:00amTower Salon A

Security Track

Blackholing at IXPs - Thomas King Worldwide Infrastructure Security Report - 10th Annual, Gary Sockrider Modern Climate of DDoS - Matt Mahvi Andre Toonk - BGP hijacks update

View full abstract page.
Speakers:

  • Merike Kaeo, DoubleShot Security
  • Ms. Kaeo has over 25 years experience leading strategic technology direction for startups, corporate security initiatives and evolving technologies. Ms. Kaeo is the founder and CEO of Double Shot Security and has in the past had positions as the Chief Information Security Officer at IID, the CTO of Guardtime, and has served on numerous technical advisory boards. She led the first security initiative for Cisco Systems in the mid 1990s and authored the first Cisco book on security - translated into more than 8 languages and leveraged for prominent security accredidation programs such as CISSP. She has contributed to numerous IETF standards, is a member of the ICANN Security and Stability Advisory Council (SSAC) and the FCC's Communictaions Security, Reliability and Interoperability Council (CSRIC). She earned a MSEE from George Washington University and a BSEE from Rutgers University.
  • Krassimir Tzvetanov, A10 Networks, Inc..
9:30am - 11:00am

Grand Ballroom

Tutorial: DWDM & Packet Optical Fundamentals: Troubleshooting the Transmission Layer

This tutorial will cover three different areas, Dense Wave Division Multiplexing, Packet Optical technology, and performance monitoring. This introduction of technologies will lead into a practical overview of methods to debug and troubleshoot optical networks, for both new and existing installations. Examples will include debug techniques for real-life issues and various solutions will be discussed.

View full abstract page.
Speakers:

  • Peter Landon, BTI
  • Peter Landon is the Director of Product Architecture in the Office of the CTO at BTI Systems, responsible for the company’s product architecture strategy. He is also a participant and contributor to the OIF as well as the ONF OTWG. His more than 25 years of experience in ASIC design include: leading the design of the tracking system for the NASA James Webb Space Telescope while at COM DEV; being appointed a “Distinguished Member of Technical Staff” in ASIC design at Lucent Technologies/Bell Labs; serving as technical manager for optical IC development at Agere Systems; and since joining BTI, leading the architecture and design of the BTI 7000 Series packet-optical transport systems, and the award-winning BTI 7800 Series Intelligent Cloud Connect platforms. Peter earned his BSc in Engineering from Queen’s University with post graduate work at Carleton University in Ottawa, Ontario.
youtubeTutorial: DWDM & Packet Optical Fundamentals
pdfTutorial: DWDM & Packet Optical Fundamentals: Troubleshooting the Tran(PDF)
9:30am - 11:00amColonial

Tutorial: NetOps Coding 101

Note: this is a single 3-hour session spanning two back-to-back tutorial slots. No coding / Python experience needed or assumed. Do you find yourself wanting to write a robot but not quite sure where to start? Ever find yourself typing the same set of commands on the CLI all day long? If so, this is the class for you! In this session, we'll focus on scripting in Python as a way to tackle a few common problems faced by all of us in the network world -- issues that typically steal your attention, but don't have to anymore. We'll take a practical approach to automating the humans and give you the foundation to go out and build your own version of Facebook's FBAR (https://www.facebook.com/notes/facebook-engineering/making-facebook-self-healing/10150275248698920). This session will be targeted to the scripting n00b -- assuming no prior coding or Python knowledge. While we won't have time to cover a proper "Intro to Python", relevant syntax will be explained as we walk through the session and you'll be armed with the knowledge to go out and build! One tip! We will be working from a virtual machine of Ubuntu Desktop throughout the session. A copy will be distributed on USB sticks, but if you would prefer a direct link, please download DEVBOX01.zip from https://drive.google.com/folderview?id=0BweIzzj21fzEfllZbnJOQXoxbmIyeHJjS2VZWFY3ajBsMEZXZFBlTVhTTTFnQjJuWnhTM0k. This VM was built using Virtual Box and will open natively, but has also been tested / confirmed to work under VMware. VirtualBox is a free download available from https://www.virtualbox.org/wiki/Downloads.

View full abstract page.
Speakers:

  • David Swafford, Facebook
  • David Swafford is a Network Engineer on Facebook's Production Engineering team. Having coming to FB a few years back as traditional network engineer, he quickly shifted focus to the software side after realizing that there simply wasn't enough time in the day to do things the traditional way. That shift has paid off well for FB as the entire network team shifted in the same manner and now we focus on much more interesting problems together. When nerding out the most, he loves to look deep into the things that make networking and large systems tick. Topics like routing protocols, TCP, and Linux fall into his favorite bedroom reading. Outside of all this, he loves to to cook any and everything under the theme of Italian-American following in the footsteps of his favorite chef Scott Conant. He also loves being active with his dog Cocoa. Best reached using [email protected], you can also find him regularly at the SF Python Meet-ups (www.meetup.com/sfpython/). Any and all levels are welcome!
youtubeTutorial: NetOps Coding 101
11:00am - 11:30amItalian RoomBreakSponsors:
11:30am - 1:00pmTower Salon A

Best Current Operational Practice (BCOP) Track

Updates on status of current Appeals and BCOP Drafts. The Best Current Operational Practice (BCOP) project is collecting the best practices known within the operations community and capturing those practices in a series of documents. This is a community project and is open to all to participate and get involved. We welcome your participation and look forward to working together to build better documentation for the entire community. Join the conversation - Subscribe to the BCOP Mail List at http://mailman.nanog.org/mailman/listinfo/bcop Questions or suggestions about BCOP should be directed to bcop-support at mailman dot org.

View full abstract page.
Speakers:
  • Chris Grundemann.
youtubeBest Current Operational Practice (BCOP) Track
11:30am - 1:00pmGrand Ballroom

Tutorial Continued: NetOps Coding 101

Do you find yourself wanting to write a robot but not quite sure where to start? Ever find yourself typing the same set of commands on the CLI all day long? If so, this is the class for you! In this session, we'll focus on scripting in Python as a way to tackle a few common problems faced by all of us in the network world -- issues that typically steal your attention, but they don't have to anymore. We'll take a practical approach to automating the humans and give you the foundation to go out and build your own version of Facebook's FBAR. This session will be targeted to the scripting n00b -- assuming no prior coding or Python knowledge. While we won't have time to cover a proper "Intro to Python", relevant syntax will be explained as we walk through the session and you'll be armed with the knowledge to go out and build!

View full abstract page.
Speakers:
  • David Swafford, Facebook.
youtubeTutorial Continued: NetOps Coding 101
11:30am - 1:00pm

Colonial

Tutorial: Troubleshooting Network Performance Issues with Active Monitoring

This tutorial will summarize a number of tools that can be used to help diagnose network performance issues, including iperf3, nuttcp, bwctl, owping and other network measurement tools. These tools are part of the perfSONAR Network monitoring toolkit. perfSONAR makes it easy to schedule regular active probes and display the results in a dashboard. The 90 min tutorial will present a number of examples of tracking down multi-domain performance issues in Research and Education network environments. The tutorial will also give a quick overview of the ESnet knowledge base fasterdata.es.net. Speaker: Brian Tierney, ESnet http://www.es.net/tierney http://fasterdata.es.net

View full abstract page.
Speakers:

  • Brian Tierney, ESnet
  • Brian Tierney is the originator and a main contributor to content of http://fasterdata.es.net. His bio is available at http://www.es.net/tierney.
youtubeTutorial: Troubleshooting Network Performance Issues
pdfTutorial: Troubleshooting Network Performance Issues with Active Monit(PDF)
1:00pm - 2:30pm32nd FloorOpen LunchSponsors:
2:30pm - 3:30pm

Grand Ballroom

The benefits of deploying IPv6 only

Use of IPv6 is gaining momentum. For some companies it is the primary IP version of choice to run their businesses and to deliver products and services to their customers. The depletion of globally routable IPv4 and private IPv4 address space has prompted many technology firms to look at the use of IPv6 while abandoning support for IPv4 in some parts of their networks. Additionally, and perhaps, more interestingly IPv6 has been rumored to outperform IPv4. New data is available from more diverse adopters that further substantiates these claims. Come hear the following as part of this panel: * Facebook will share information about their IPv6 only efforts including the data they are seeing comparing IPv4 and IPv6 performance. * Comcast will share how they are using IPv6 only for their next generating entertainment operating system as well as IPv6 differences compared to IPv4. * T-Mobile will share information about the deployment of IPv6 only across their mobile network which minimally includes lessons learned and techniques to ensure IPv4 content continues to be reachable. Other participants may be added in advance of the actual panel session. Akamai and LinkedIn have both been invited.

View full abstract page.
Speakers:

  • John Jason Brzozowski, Comcast
  • John Jason Brzozowski, Fellow and Chief IPv6 Architect A proven technology leader John has been the driving force behind Comcast’s IPv6 transition and deployment since the program began in 2005. His accomplishments and success leading Comcast’s IPv6 deployment are recognized around the globe. John’s tireless efforts continue as he advances the adoption of IPv6 across all of Comcast’s infrastructure and services. He leverages his expertise and experience to drive the adoption and implementation of IPv6 in the real world and at scale, ensuring that innovative solutions are in place to support traditional and next generation services. His pioneering work has had significant impacts not only within Comcast but also across the entire cable industry and beyond. He has and continues to be instrumental in encouraging the adoption of IPv6 across the broadband, content, and consumer electronics ecosystems.
  • Geoff Huston, APNIC.
  • Gaurav Madan, T-Mobile USA Inc.
  • Paul Saab.
youtubeThe benefits of deploying IPv6 only
pdfThe benefits of deploying IPv6 only (slides)(PDF)
3:30pm - 4:00pm

Grand Ballroom

Latency IPv4 vs IPv6: Understanding the difference

During last years much attention was paid for process of deploying IPv6 in different regions. And with growing IPv6 adoption the requirements also grew up. Today we require not just working IPv6 but reliable IPv6. Of course this aim brings to our attention IPv6 network latency which we want to be comparable to IPv4 latency. First measurements gave community very interesting and promising results – for some networks IPv6 was faster than IPv4. But why IPv6 had less latency – there was no clear evidence. In my report I’m going to discuss reasons why in some cases IPv6 is faster than IPv4 and why it is slower in other ones.

View full abstract page.
Speakers:

  • Alexander Azimov, Qrator Labs
  • Network Arhitect at Qrator Labs Head of Radar by Qrator project
youtubeLatency IPv4 vs IPv6: Understanding the difference
pdfLatency IPv4 vs IPv6: Understanding the difference (slides)(PDF)
4:00pm - 4:30pmItalian RoomBreakSponsors:
4:30pm - 5:00pm

Grand Ballroom

Network Automation and Programmability Abstraction Layer with Multivendor support

The Python library dubbed Napalm - short for Network Automation and Programmability Abstraction Layer with Multivendor support - helps interact with devices from various vendors though a unified set of commands. It currently supports Arista, Juniper, Cisco (IOS-XR) and FortiGate. It provides methods to replace or merge the configurations on the devices, view a diff, commit the changes, or roll them back. It also provides an Ansible plugin, which enables administrators to push configurations directly from Ansible playbooks. Napalm is open source and available on Github: https://github.com/spotify/napalm We will present more details about Napalm, how to use it and show in a demo how to instantaneously configure a set of multivendor devices.

View full abstract page.
Speakers:

  • David Barroso, Spotify
  • David is a network engineer focused on network design, automation and SDN. At Spotify he has built and opensourced several libraries to help automating different network operating systems and built an SDN router amongst other cool stuff.

  • Elisa Jasinska, BigWave
  • Elisa Jasinska started her Internet career as a Network Engineer at the Amsterdam Internet Exchange in 2005. Over the years, she has implemented numerous traffic accounting solutions, as well as many automation tools and systems for various companies. She takes great pleasure in discovering new technologies, solving problems and actively participating in the Internet community.
youtubeNetwork Automation and Programmability Abstraction Layer
pdfNetwork Automation and Programmability Abstraction Layer with Multiven(PDF)
5:00pm - 5:30pm

Grand Ballroom

Dynamic Service Chaining for SDN/NFV

In talk focus on framework for dynamic L4-L7 services in NFV/SDN environments. The modern service provider and data center networks demand cloud delivery model for agile and cost-effective rollout of services for revenue generation. There are some proposals to incorporate service insertion in the emerging SDN and NFV environments. However, the current methods are sub-optimal, complex and inflexible in delivering automated end-to-end service delivery. In a virtualized cloud environment, service delivery requires intelligence in the network for policy-based traffic handling and differentiated services. Dynamic service chaining is a fundamental component in building an on-demand and scalable model for policy enforcement. This session will cover following topics: 1. NFV & Service chaining use cases 2. Challenges with existing solutions 3. Opportunities with dynamic service chaining 4. Policy Enforcement model in SDN/NFV environment 5. Dynamic Service Chaining Architecture & Design considerations 6. Benefits of Dynamic Service Chaining

View full abstract page.
Speakers:

  • Kishore Inampudi, A10 Networks
  • Kishore Inampudi is a Director of Product Management at A10 Networks where he leads Service Provider, SDN and NFV solutions. Kishore has over 15 years of diverse experience in Networking industry in the marketing, sales and engineering functions. Kishore has an MBA from UC Berkeley, Haas School of Business and Master’s degree in Computer Engineering from San Jose State University.
youtubeDynamic Service Chaining for SDN/NFV
pdfDynamic Service Chaining for SDN/NFV (slides)(PDF)
5:30pm - 6:00pm

Grand BallroomLightning TalkspdfCadora Lightning Talk(PDF)
pdfHuston Lightning Talk(PDF)
youtubeLightning Talks
pdfMartin Lightning Talk(PDF)
6:00pm - 8:00pmCalifornia East/West - ElizabethanBeer 'n GearSponsors:
8:30pm - 11:00pmOffsiteSocial
Additional information
Sponsors:
Wednesday, June 3 2015
Time/Webcast:Room:Topic/Abstract:Presenter/Sponsor:Presentation Files:
8:30am - 9:30am32nd FloorPower BreakfastSponsors:
8:30am - 5:00pmMezzanine Registration AreaRegistration
9:30am - 10:00am

Grand Ballroom

Rethinking Centralization

Centralization seems to be the current "silver bullet" for network complexity — but will it really "solve" for complexity, or just bring us another round of "pushing complexity around?" This presentation considers an alternative view of the centralization/decentralization debate.

View full abstract page.
Speakers:

  • Russ White, Ericsson
  • Russ White has scribbled a basket of books, penned a plethora of patents, written a raft of RFCs, taught a trencher of classes, nibbled and noodled at a lot of networks, and done a lot of other stuff you either already know about — or don't really care about. You can find Russ at 'net Work, the Internet Protocol Journal, PAcket Pushers, LinkedIn, and his author page on Amazon.
youtubeRethinking Centralization
pdfRethinking Centralization (slides)(PDF)
10:00am - 10:30am

Grand Ballroom

QUIC: Next generation multiplexed transport over UDP

QUIC is a new transport protocol that runs on top of UDP. It is currently deployed to a significant fraction of Chrome users of Google services. It combines TCP-style congestion control, TLS-grade security, and HTTP/2 multiplexing. Our measurements on real-world traffic show that QUIC significantly decreases page load times and time between pauses in video playbacks. Google will continue scaling up the use of QUIC on the public internet over the next few months, with the goal of sending all Google traffic over QUIC. This talk will discuss how QUIC works, why it's an improvement over TCP, the problems we're anticipating as we deploy at scale, and what we're doing to prevent them.

View full abstract page.
Speakers:
  • Brian Rogan, Google.
  • Ian Swett, Google
  • Software developer working on the QUIC internet transport being developed by Google. I focus on issues related to YouTube, including video quality of experience, and deployment.
youtubeQUIC: Next generation multiplexed transport over UDP
pdfQUIC: Next generation multiplexed transport over UDP (slides)(PDF)
10:30am - 11:00am

Grand Ballroom

Motivation, Analysis, and Architecture for IPv4aaS

In this talk, we share our work in creating an “IPv4 as a service” network overlay. We begin by suggesting there is value in building network infrastructure which is “lean” and "IPv6 focused". There is likely value in focusing on a lean FIB infrastructure and IPv6 focused functionality in our next-generation routing platforms. We performed traffic analysis on how IPv4 is being used in our network today. We found that 90% of the traffic in our fully routed backbone is done by %0.005 of the routes. 99% of the traffic is performed by 4.5% of the prefixes. This data suggests we can incrementally deploy an IPv4aaS solution. Our goal is to build an IPv4aaS using cloud infrastructure based on open source and home grown software. We then present an IPv4aaS built on top of LISP. While we use LISP encapsulation, we have decided not to use the LISP DDT “routing” mechanism. Our IPv4aaS overlay routing architecture must associate IPv4 prefixes with IPv6 next-hops. This isn’t supported with “classic” BGP today. To solve this, we augmented JSON BGP IPv4 prefix updates with additional JSON information, namely an IPv6 next-hop. Effectively, we created a BGP IPv4 update with an IPv6 next-hop value. These messages are HTTP PUT to a route reflector / controller device, which processes the updates and applies associated business rules. These messages are then HTTP PUT to the overlay ingress (iTR) which announce a “default” to the underlay network. We then suggest the concepts in this presentation are an extension to the concepts we've made at the previous two June NANOG meetings.

View full abstract page.
Speakers:
  • Brian Field, Comcast.
youtubeMotivation, Analysis, and Architecture for IPv4aaS
pdfMotivation, Analysis, and Architecture for IPv4aaS (slides)(PDF)
11:00am - 11:30amItalian RoomBreakSponsors:
11:30am - 12:00pm

Grand Ballroom

Source Routing 2.0. Why Now, Why Again?

Traditional source routing using IP header options was never widely deployed due to security concerns. Recent buzz around Segment Routing (a.k.a. SPRING) has re-invigorated interest in source routing technologies and their potential benefits. For many operators however, moving to SPRING represents a significant change in their operating practices, so in a more incremental approach they are implementing SPRING-inspired designs using current technologies with minor augmentations. In this talk we will review SPRING/SR, but will mainly focus on using existing protocols for achieving similar benefits. We will discuss: - clever usage of static LSPs to achieve predictable label values in a data-center network - minor enhancements to BGP-LU for more resilient EPE (Egress Peer Engineering) - interoperability considerations between SPRING and non-SPRING domains

View full abstract page.
Speakers:

  • Nick Slabakov, Juniper Networks
  • Nick Slabakov is Chief Architect for the Web Services group, where he works with some of Juniper's most innovative customers on solutions to the challenges of scale, programmability, and efficiency in their networks. Nick’s recent work and industry involvement spans the areas of MPLS-TE, SPRING, SDN, Cloud Networking, and Network Automation / Programmability. His previous roles in Juniper included various Systems Engineering positions supporting Tier 1 carriers. Prior to Juniper, Nick was a Principal Systems Engineer at Riverstone Networks, which followed 10 years of experience as a Network Engineer in Enterprise and Service Provider settings.
youtubeSource Routing 2.0. Why Now, Why Again?
pdfSource Routing 2.0. Why Now, Why Again? (slides)(PDF)
12:00pm - 12:30pm

Grand Ballroom

SDN in the Management Plane: OpenConfig and Streaming Telemetry

Abstract Follows: The networking industry has made good progress in the last few years on developing programmable interfaces and protocols for the control plane to enable a more dynamic and efficient infrastructure. Despite this progress, some parts of networking risk being left behind, most notably network management and configuration. The state-of-the-art in network management remains relegated to proprietary device interfaces (e.g., CLIs), imperative, incremental configuration, and lack of meaningful abstractions. We propose a framework for network configuration guided by software-defined networking principles, with a focus on developing common models of network devices, and common languages to describe network structure and policies. We also propose a publish/subscribe framework for next generation network telemetry, focused on streaming structured data from network elements themselves.

View full abstract page.
Speakers:

  • Joshua George, Google
  • Joshua George is a Network Engineer in Google's Strategic Network Engineering team. He focuses on the long term design of Google's core network and systems infrastructure. Prior to Google, Joshua held multiple positions at both Cox Communications and Time Warner Cable.

  • Anees Shaikh, Google
  • Anees Shaikh is with the Network Architecture team at Google where he works on operational aspects related to SDN, cloud networking, network visibility, and configuration and management in Google’s production networks. Prior to joining Google, he was the Chief SDN Architect in IBM System Networking where he was responsible for IBM's software-defined networking product architecture and technical strategy, including leading IBM’s open source networking engagements. For over a decade, Anees was a Research Staff Member and Manager at the IBM T.J. Watson Research Center.
youtubeSDN in the Management Plane
pdfSDN in the Management Plane: OpenConfig and Streaming Telemetry (slide(PDF)
12:30pm - 1:00pm

Grand Ballroom

Architecture for fine-grain, high-resolution Telemetry for network elements.

The Networks evolve quickly to be highly automated, self-adapting, and intelligent integrated systems. However, even the most intelligent system can take as good decision as good input information it is provided with.. In this session we address an architecture that enables high frequency export of telemetry data from network elements. Traditional protocols like SNMP retrieve data from network elements using a “pull” model, which suffers from several well documented shortcomings, the most important being a centralized architecture which causes strain on the central processor of the network element, taking away cycles from the main functions of the router. This architecture addresses the problem by creating a distributed export mechanism where telemetry is “pushed” out directly from the source, rather than relying on the central component. This is intended to enable innovative applications, such as dynamic provisioning of devices based on utilization levels, security and/or quality prediction base don anomaly heuristic analysis, etc. The architecture defines the following 1. The Open telemetry model for a network element. - Configuration and Provisioning - Capability discovery 2. Implementation of telemetry probes in various internal sub systems of a network element. 3. Open-source based Export mechanisms via which telemetry data is generated

View full abstract page.
Speakers:
  • Rafal Szarecki, Juniper Networks.
youtubeArchitecture for fine-grain, high-resolution Telemetry
pdfArchitecture for fine-grain, high-resolution Telemetry for network ele(PDF)
1:00pm - 2:30pm Lunch - On your Own
2:30pm - 4:00pm

Grand Ballroom

Peering Track

Blackholing at IXPs - Daniel Kopp, DE-CIX Rethinking Price Models (Work in Progress) - Raul Sejas, Telefonica Peering Configuration Automation - Tom Paseka, CloudFlare Standards for Peering Automation - Elisa Jasinska, BigWave IT Providing Self-Service for Google's Peers - Brian Rogan, Google PeeringDB, SDN, NFV, Oh my! - Aaron Hughes, 6connect

View full abstract page.
Speakers:

  • Greg Hankins, Alcatel-Lucent
  • Greg Hankins is a Senior Product Line Manager at Alcatel-Lucent for the 7750 SR and 7950 XRS product lines. He works with service providers and Internet exchanges around the world to deliver advanced network solutions. Greg has been an active member of the network operator and peering community for over 15 years, and frequently speaks at network operator conferences on network technology and operational topics. Prior to joining Alcatel-Lucent, Greg held technical marketing and systems engineering positions at Brocade Communications, Force10 Networks and Riverstone Networks, and network engineering positions at MindSpring Enterprises and Georgia Tech.
  • Aaron Hughes, 6connect.
  • Elisa Jasinska, BigWave
  • Elisa Jasinska started her Internet career as a Network Engineer at the Amsterdam Internet Exchange in 2005. Over the years, she has implemented numerous traffic accounting solutions, as well as many automation tools and systems for various companies. She takes great pleasure in discovering new technologies, solving problems and actively participating in the Internet community.
  • Daniel Kopp, DE-CIX.
  • Tom Paseka, CloudFlare.
  • Brian Rogan, Google.
  • Raul Sejas, Telefonica.
pdfPeering Track(PDF)
pdfPeering Track(PDF)
pdfPeering Track(PDF)
pdfPeering Track(PDF)
youtubePeering Track
pdfPeering Track(PDF)
pdfPeering Track(PDF)
2:30pm - 4:00pmTower Salon A

Tutorial: Denial of Service 101

This talk covers the principles and particular implementations of DDoS. It goes in detail as to what are the bottlenecks that are generally exploited/overloaded, the attack types and the solutions to those.

View full abstract page.
Speakers:
  • Krassimir Tzvetanov, A10 Networks, Inc..
youtubeTutorial: Denial of Service 101
pdfTutorial: Denial of Service 101 (slides)(PDF)
2:30pm - 4:00pmColonial

Tutorial: Whiteboarding 101

The “whiteboard talk” represents one of the key ways that engineers can communicate ideas in a concise and educational way to colleagues. More than a classroom lecture or a slide presentation, a whiteboard talk is a combination of several disciplines including teaching, storytelling, the visual display of information, and improvisational acting. In this tutorial, the attendees will learn how to organize a whiteboard discussion, how to avoid popular pitfalls, and how to make sure that their audience walks away with the knowledge that the attendee wants them to have. These topics include how to narrow down the scope of a topic (both in terms of the topic itself and the level of abstraction), how to build the knowledge model for the talk, how to define terms for different audiences, and how to handle difficult audience members.

View full abstract page.
Speakers:
  • Matt Ringel, Akamai Technologies.
youtubeTutorial: Whiteboarding 101
4:00pm - 4:30pmItalian RoomBreakSponsors:
4:30pm - 5:00pm

Grand Ballroom

New Cybersecurity Obligations and CPNI Rules Represent Regulatory Sea-Change for Network Operators

The early months of 2015 have seen an unprecedented level of action in the realm of U.S. cybersecurity policy. The Obama Administration, in response to a growing number of cybersecurity compromises and data breaches has announced an aggressive cybersecruity and data security agenda. The activity appears motivated at lease in part by the spike in the number of U.S. data breaches in 2014. The Cybersecurity agenda of the Obama Administration will have direct and indirect consequences for network operators potentially adding to their already substantial regulatory burdens. On top of these new obligations, the FCC adopted new open Internet rules that for the first regulate how data Internet service providers can utilize Consumer Proprietary Network Information (CPNI). That's a big deal to network operators who supplement revenue from user fees in a variety of ways by trafficking in user data. This presentation will educate the audience on the new rules and outline compliance strategies. About the Presenter: Ross A. Buntrock ([email protected]) is a partner at Arnall Golden Gregory LLP in Washington DC and is a member of the the Government and Regulatory, Litigation and Privacy and Consumer Regulatory practices. Mr. Buntrock is the leader of the Media, Technology, and Telecommunications industry teams. He has 20 years of experience representing all segments of the industry. He is nationally recognized for his work in communications, media, and technology law.

View full abstract page.
Speakers:

  • Ross Buntrock, Arnall Golden Gregory
  • Ross A. Buntrock is a partner in the Washington, D.C. office of Arnall Golden Gregory LLP. He is a member of the Government and Regulatory, Litigation and Privacy and Consumer Regulatory practices and the leader of the Media, Technology, and Telecommunications industry team. He has nearly 20 years of experience representing all segments of the communications industry including network operators, mobile and wireline carriers, mobile-content providers, mobile payment companies, app and platform developers, and trade associations on all aspects of communications and trade regulation. He is nationally recognized for his work in communications, media, and technology law. Ross has been designated a Certified Information Privacy Professional by the International Association of Privacy Professionals and is a member of the Virginia and DC Bars.
youtubeNew Cybersecurity Obligations and CPNI Rules
pdfNew Cybersecurity Obligations and CPNI Rules Represent Regulatory Sea-(PDF)
5:00pm - 5:30pm

Grand Ballroom

Evolution of Ethernet Speeds - What’s New and What’s Next

In this presentations we'll talk about the latest Ethernet developments that are bringing a variety of new technology to the market for different applications with speeds ranging from 2.5 GE to 400 GE. We'll take a look at the new 2.5 GE, 5 GE and 25 GE speeds, 2nd generation 40 GE and 100 GE, 400 GE and what's possible in the future.

View full abstract page.
Speakers:

  • Greg Hankins, Alcatel-Lucent
  • Greg Hankins is a Senior Product Line Manager at Alcatel-Lucent for the 7750 SR and 7950 XRS product lines. He works with service providers and Internet exchanges around the world to deliver advanced network solutions. Greg has been an active member of the network operator and peering community for over 15 years, and frequently speaks at network operator conferences on network technology and operational topics. Prior to joining Alcatel-Lucent, Greg held technical marketing and systems engineering positions at Brocade Communications, Force10 Networks and Riverstone Networks, and network engineering positions at MindSpring Enterprises and Georgia Tech.
youtubeEvolution of Ethernet Speeds
pdfEvolution of Ethernet Speeds - What’s New and What’s Next (slides)(PDF)
5:30pm - 6:00pm

Grand Ballroom

RSVP-TE usability at scale

RSVP-TE is widely deployed. Over the years, various operationally challenging issues have emerged – both due to how RSVP-TE gets deployed and also how it has been implemented by various router vendors. This talk shall very briefly summarize the operationally-significant issues in deploying RSVP-TE at scale, from a perspective of: a. LSP configuration, b. Monitoring LSPs, c. Maximizing network utilization: Multi-path and load-balancing, d. Minimizing data losses during LSP re-optimization, e. Reducing network churn. Thereafter, the talk shall present mechanisms and recommendations to address each of the above operationally-challenging aspects.

View full abstract page.
Speakers:

  • Ravi Singh, Juniper
  • Ravi Singh is a principal software engineer in the routing/MPLS team at Juniper Networks. He has implemented various unicast/multicast and MPLS-signaling-protocols functionality. He helped ship the PTX series of Juniper platforms that are getting deployed in the super-core of various tier-1 networks.
youtubeRSVP-TE usability at scale
pdfRSVP-TE usability at scale (slides)(PDF)
6:00pm - 6:15pm

Grand Ballroom

Conference Closing

Closing summary remarks from NANOG Executive Director and others. Detailed Agenda to be posted as the meeting time approaches.

View full abstract page.
Speakers:
  • Betty Burke, NANOG Executive Director.
  • Tony Tauber, Comcast
  • In his role as Distinguished Engineer at Comcast, Tony focuses on Backbone and Core network architecture and engineering with particular attention to measurement, manageability, and automation. He also partners with the research and education communities on projects and currently chairs the NANOG Program Committee. In the past Tony held senior network engineering positions at BBN, GTE Internetworking, Genuity, Level3, and MIT Lincoln Lab as well as served as co-chair of the Routing Protocol Security working group in the IETF.
youtubeConference Closing
pdfConference Closing (slides)(PDF)

 

^ Back to Top